0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Kismet Hacking (Paperback): Frank Thornton, Michael J. Schearer, Brad Haines Kismet Hacking (Paperback)
Frank Thornton, Michael J. Schearer, Brad Haines
R1,154 Discovery Miles 11 540 Ships in 10 - 15 working days

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.
Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.
*Wardrive Running Kismet from the BackTrack Live CD
*Build and Integrate Drones with your Kismet Server
*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive

Seven Deadliest Wireless Technologies Attacks (Paperback): Brad Haines Seven Deadliest Wireless Technologies Attacks (Paperback)
Brad Haines
R539 R476 Discovery Miles 4 760 Save R63 (12%) Ships in 10 - 15 working days

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised. This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Raz Tech Microphone Stereo Audio Cable…
R399 R179 Discovery Miles 1 790
Power And Loss In South African…
Glenda Daniels Paperback R380 R351 Discovery Miles 3 510
Guess Dare Eau De Toilette (100ml…
 (1)
R1,821 R900 Discovery Miles 9 000
Let's Rock
The Black Keys CD R229 Discovery Miles 2 290
Baby Toothpaste (Strawberry 45g)
R51 Discovery Miles 510
Kaufmann 85W 230V Fountain Pump (Black)
R1,586 Discovery Miles 15 860
Ultra Link Universal Laptop Charger…
R599 R519 Discovery Miles 5 190
Tower Gift Labels - Christmas Note…
R29 R19 Discovery Miles 190
Alva 5-Piece Roll-Up BBQ/ Braai Tool Set
R477 R373 Discovery Miles 3 730
Casio LW-200-7AV Watch with 10-Year…
R999 R899 Discovery Miles 8 990

 

Partners